• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (C) 2011 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 // #define LOG_NDEBUG 0
18 
19 /*
20  * The CommandListener, FrameworkListener don't allow for
21  * multiple calls in parallel to reach the BandwidthController.
22  * If they ever were to allow it, then netd/ would need some tweaking.
23  */
24 
25 #include <ctype.h>
26 #include <errno.h>
27 #include <fcntl.h>
28 #include <stdio.h>
29 #include <stdlib.h>
30 #include <string.h>
31 #include <string>
32 #include <vector>
33 
34 #define __STDC_FORMAT_MACROS 1
35 #include <inttypes.h>
36 
37 #include <sys/socket.h>
38 #include <sys/stat.h>
39 #include <sys/types.h>
40 #include <sys/wait.h>
41 
42 #include <linux/netlink.h>
43 #include <linux/rtnetlink.h>
44 #include <linux/pkt_sched.h>
45 
46 #include "android-base/stringprintf.h"
47 #include "android-base/strings.h"
48 #define LOG_TAG "BandwidthController"
49 #include <cutils/properties.h>
50 #include <log/log.h>
51 #include <logwrap/logwrap.h>
52 
53 #include <netdutils/Syscalls.h>
54 #include "BandwidthController.h"
55 #include "Controllers.h"
56 #include "FirewallController.h" /* For makeCriticalCommands */
57 #include "Fwmark.h"
58 #include "NetdConstants.h"
59 #include "TrafficController.h"
60 #include "bpf/BpfUtils.h"
61 
62 /* Alphabetical */
63 #define ALERT_IPT_TEMPLATE "%s %s -m quota2 ! --quota %" PRId64" --name %s\n"
64 const char BandwidthController::LOCAL_INPUT[] = "bw_INPUT";
65 const char BandwidthController::LOCAL_FORWARD[] = "bw_FORWARD";
66 const char BandwidthController::LOCAL_OUTPUT[] = "bw_OUTPUT";
67 const char BandwidthController::LOCAL_RAW_PREROUTING[] = "bw_raw_PREROUTING";
68 const char BandwidthController::LOCAL_MANGLE_POSTROUTING[] = "bw_mangle_POSTROUTING";
69 const char BandwidthController::LOCAL_GLOBAL_ALERT[] = "bw_global_alert";
70 
71 auto BandwidthController::iptablesRestoreFunction = execIptablesRestoreWithOutput;
72 
73 using android::base::Join;
74 using android::base::StringAppendF;
75 using android::base::StringPrintf;
76 using android::net::FirewallController;
77 using android::net::gCtls;
78 using android::netdutils::Status;
79 using android::netdutils::StatusOr;
80 using android::netdutils::UniqueFile;
81 
82 namespace {
83 
84 const char ALERT_GLOBAL_NAME[] = "globalAlert";
85 const std::string NEW_CHAIN_COMMAND = "-N ";
86 
87 const char NAUGHTY_CHAIN[] = "bw_penalty_box";
88 const char NICE_CHAIN[] = "bw_happy_box";
89 
90 /**
91  * Some comments about the rules:
92  *  * Ordering
93  *    - when an interface is marked as costly it should be INSERTED into the INPUT/OUTPUT chains.
94  *      E.g. "-I bw_INPUT -i rmnet0 --jump costly"
95  *    - quota'd rules in the costly chain should be before bw_penalty_box lookups.
96  *    - the qtaguid counting is done at the end of the bw_INPUT/bw_OUTPUT user chains.
97  *
98  * * global quota vs per interface quota
99  *   - global quota for all costly interfaces uses a single costly chain:
100  *    . initial rules
101  *      iptables -N bw_costly_shared
102  *      iptables -I bw_INPUT -i iface0 --jump bw_costly_shared
103  *      iptables -I bw_OUTPUT -o iface0 --jump bw_costly_shared
104  *      iptables -I bw_costly_shared -m quota \! --quota 500000 \
105  *          --jump REJECT --reject-with icmp-net-prohibited
106  *      iptables -A bw_costly_shared --jump bw_penalty_box
107  *      iptables -A bw_penalty_box --jump bw_happy_box
108  *      iptables -A bw_happy_box --jump bw_data_saver
109  *
110  *    . adding a new iface to this, E.g.:
111  *      iptables -I bw_INPUT -i iface1 --jump bw_costly_shared
112  *      iptables -I bw_OUTPUT -o iface1 --jump bw_costly_shared
113  *
114  *   - quota per interface. This is achieve by having "costly" chains per quota.
115  *     E.g. adding a new costly interface iface0 with its own quota:
116  *      iptables -N bw_costly_iface0
117  *      iptables -I bw_INPUT -i iface0 --jump bw_costly_iface0
118  *      iptables -I bw_OUTPUT -o iface0 --jump bw_costly_iface0
119  *      iptables -A bw_costly_iface0 -m quota \! --quota 500000 \
120  *          --jump REJECT --reject-with icmp-port-unreachable
121  *      iptables -A bw_costly_iface0 --jump bw_penalty_box
122  *
123  * * Penalty box, happy box and data saver.
124  *   - bw_penalty box is a blacklist of apps that are rejected.
125  *   - bw_happy_box is a whitelist of apps. It always includes all system apps
126  *   - bw_data_saver implements data usage restrictions.
127  *   - Via the UI the user can add and remove apps from the whitelist and
128  *     blacklist, and turn on/off data saver.
129  *   - The blacklist takes precedence over the whitelist and the whitelist
130  *     takes precedence over data saver.
131  *
132  * * bw_penalty_box handling:
133  *  - only one bw_penalty_box for all interfaces
134  *   E.g  Adding an app:
135  *    iptables -I bw_penalty_box -m owner --uid-owner app_3 \
136  *        --jump REJECT --reject-with icmp-port-unreachable
137  *
138  * * bw_happy_box handling:
139  *  - The bw_happy_box comes after the penalty box.
140  *   E.g  Adding a happy app,
141  *    iptables -I bw_happy_box -m owner --uid-owner app_3 \
142  *        --jump RETURN
143  *
144  * * bw_data_saver handling:
145  *  - The bw_data_saver comes after the happy box.
146  *    Enable data saver:
147  *      iptables -R 1 bw_data_saver --jump REJECT --reject-with icmp-port-unreachable
148  *    Disable data saver:
149  *      iptables -R 1 bw_data_saver --jump RETURN
150  */
151 
152 const std::string COMMIT_AND_CLOSE = "COMMIT\n";
153 const std::string HAPPY_BOX_MATCH_WHITELIST_COMMAND =
154         StringPrintf("-I bw_happy_box -m owner --uid-owner %d-%d --jump RETURN", 0, MAX_SYSTEM_UID);
155 const std::string BPF_HAPPY_BOX_MATCH_WHITELIST_COMMAND = StringPrintf(
156         "-I bw_happy_box -m bpf --object-pinned %s -j RETURN", XT_BPF_WHITELIST_PROG_PATH);
157 const std::string BPF_PENALTY_BOX_MATCH_BLACKLIST_COMMAND = StringPrintf(
158         "-I bw_penalty_box -m bpf --object-pinned %s -j REJECT", XT_BPF_BLACKLIST_PROG_PATH);
159 
160 static const std::vector<std::string> IPT_FLUSH_COMMANDS = {
161         /*
162          * Cleanup rules.
163          * Should normally include bw_costly_<iface>, but we rely on the way they are setup
164          * to allow coexistance.
165          */
166         "*filter",
167         ":bw_INPUT -",
168         ":bw_OUTPUT -",
169         ":bw_FORWARD -",
170         ":bw_happy_box -",
171         ":bw_penalty_box -",
172         ":bw_data_saver -",
173         ":bw_costly_shared -",
174         ":bw_global_alert -",
175         "COMMIT",
176         "*raw",
177         ":bw_raw_PREROUTING -",
178         "COMMIT",
179         "*mangle",
180         ":bw_mangle_POSTROUTING -",
181         COMMIT_AND_CLOSE};
182 
183 static const uint32_t uidBillingMask = Fwmark::getUidBillingMask();
184 
185 /**
186  * Basic commands for creation of hooks into data accounting and data boxes.
187  *
188  * Included in these commands are rules to prevent the double-counting of IPsec
189  * packets. The general overview is as follows:
190  * > All interface counters (counted in PREROUTING, POSTROUTING) must be
191  *     completely accurate, and count only the outer packet. As such, the inner
192  *     packet must be ignored, which is done through the use of two rules: use
193  *     of the policy module (for tunnel mode), and VTI interface checks (for
194  *     tunnel or transport-in-tunnel mode). The VTI interfaces should be named
195  *     ipsec*
196  * > Outbound UID billing can always be done with the outer packets, due to the
197  *     ability to always find the correct UID (based on the skb->sk). As such,
198  *     the inner packets should be ignored based on the policy module, or the
199  *     output interface if a VTI (ipsec+)
200  * > Inbound UDP-encap-ESP packets can be correctly mapped to the UID that
201  *     opened the encap socket, and as such, should be billed as early as
202  *     possible (for transport mode; tunnel mode usage should be billed to
203  *     sending/receiving application). Due to the inner packet being
204  *     indistinguishable from the inner packet of ESP, a uidBillingDone mark
205  *     has to be applied to prevent counting a second time.
206  * > Inbound ESP has no socket, and as such must be accounted later. ESP
207  *     protocol packets are skipped via a blanket rule.
208  * > Note that this solution is asymmetrical. Adding the VTI or policy matcher
209  *     ignore rule in the input chain would actually break the INPUT chain;
210  *     Those rules are designed to ignore inner packets, and in the tunnel
211  *     mode UDP, or any ESP case, we would not have billed the outer packet.
212  *
213  * See go/ipsec-data-accounting for more information.
214  */
215 
getBasicAccountingCommands(const bool useBpf)216 const std::vector<std::string> getBasicAccountingCommands(const bool useBpf) {
217     const std::vector<std::string> ipt_basic_accounting_commands = {
218             "*filter",
219 
220             "-A bw_INPUT -j bw_global_alert",
221             // Prevents IPSec double counting (ESP and UDP-encap-ESP respectively)
222             "-A bw_INPUT -p esp -j RETURN",
223             StringPrintf("-A bw_INPUT -m mark --mark 0x%x/0x%x -j RETURN", uidBillingMask,
224                          uidBillingMask),
225             useBpf ? "" : "-A bw_INPUT -m owner --socket-exists",
226             StringPrintf("-A bw_INPUT -j MARK --or-mark 0x%x", uidBillingMask),
227 
228             "-A bw_OUTPUT -j bw_global_alert",
229             // Prevents IPSec double counting (Tunnel mode and Transport mode,
230             // respectively)
231             "-A bw_OUTPUT -o " IPSEC_IFACE_PREFIX "+ -j RETURN",
232             "-A bw_OUTPUT -m policy --pol ipsec --dir out -j RETURN",
233             useBpf ? "" : "-A bw_OUTPUT -m owner --socket-exists",
234 
235             "-A bw_costly_shared --jump bw_penalty_box",
236             useBpf ? BPF_PENALTY_BOX_MATCH_BLACKLIST_COMMAND : "",
237             "-A bw_penalty_box --jump bw_happy_box", "-A bw_happy_box --jump bw_data_saver",
238             "-A bw_data_saver -j RETURN",
239             useBpf ? BPF_HAPPY_BOX_MATCH_WHITELIST_COMMAND : HAPPY_BOX_MATCH_WHITELIST_COMMAND,
240             "COMMIT",
241 
242             "*raw",
243             // Prevents IPSec double counting (Tunnel mode and Transport mode,
244             // respectively)
245             "-A bw_raw_PREROUTING -i " IPSEC_IFACE_PREFIX "+ -j RETURN",
246             "-A bw_raw_PREROUTING -m policy --pol ipsec --dir in -j RETURN",
247             useBpf ? StringPrintf("-A bw_raw_PREROUTING -m bpf --object-pinned %s",
248                                   XT_BPF_INGRESS_PROG_PATH)
249                    : "-A bw_raw_PREROUTING -m owner --socket-exists",
250             "COMMIT",
251 
252             "*mangle",
253             // Prevents IPSec double counting (Tunnel mode and Transport mode,
254             // respectively)
255             "-A bw_mangle_POSTROUTING -o " IPSEC_IFACE_PREFIX "+ -j RETURN",
256             "-A bw_mangle_POSTROUTING -m policy --pol ipsec --dir out -j RETURN",
257             useBpf ? "" : "-A bw_mangle_POSTROUTING -m owner --socket-exists",
258             StringPrintf("-A bw_mangle_POSTROUTING -j MARK --set-mark 0x0/0x%x",
259                          uidBillingMask),  // Clear the mark before sending this packet
260             useBpf ? StringPrintf("-A bw_mangle_POSTROUTING -m bpf --object-pinned %s",
261                                   XT_BPF_EGRESS_PROG_PATH)
262                    : "",
263             COMMIT_AND_CLOSE};
264     return ipt_basic_accounting_commands;
265 }
266 
267 
toStrVec(int num,const char * const strs[])268 std::vector<std::string> toStrVec(int num, const char* const strs[]) {
269     return std::vector<std::string>(strs, strs + num);
270 }
271 
272 }  // namespace
273 
setBpfEnabled(bool isEnabled)274 void BandwidthController::setBpfEnabled(bool isEnabled) {
275     mBpfSupported = isEnabled;
276 }
277 
BandwidthController()278 BandwidthController::BandwidthController() {
279 }
280 
flushCleanTables(bool doClean)281 void BandwidthController::flushCleanTables(bool doClean) {
282     /* Flush and remove the bw_costly_<iface> tables */
283     flushExistingCostlyTables(doClean);
284 
285     std::string commands = Join(IPT_FLUSH_COMMANDS, '\n');
286     iptablesRestoreFunction(V4V6, commands, nullptr);
287 }
288 
setupIptablesHooks()289 int BandwidthController::setupIptablesHooks() {
290     /* flush+clean is allowed to fail */
291     flushCleanTables(true);
292     return 0;
293 }
294 
enableBandwidthControl()295 int BandwidthController::enableBandwidthControl() {
296     /* Let's pretend we started from scratch ... */
297     mSharedQuotaIfaces.clear();
298     mQuotaIfaces.clear();
299     mGlobalAlertBytes = 0;
300     mSharedQuotaBytes = mSharedAlertBytes = 0;
301 
302     flushCleanTables(false);
303 
304     std::string commands = Join(getBasicAccountingCommands(mBpfSupported), '\n');
305     return iptablesRestoreFunction(V4V6, commands, nullptr);
306 }
307 
disableBandwidthControl()308 int BandwidthController::disableBandwidthControl() {
309 
310     flushCleanTables(false);
311     return 0;
312 }
313 
makeDataSaverCommand(IptablesTarget target,bool enable)314 std::string BandwidthController::makeDataSaverCommand(IptablesTarget target, bool enable) {
315     std::string cmd;
316     const char *chainName = "bw_data_saver";
317     const char *op = jumpToString(enable ? IptJumpReject : IptJumpReturn);
318     std::string criticalCommands = enable ?
319             FirewallController::makeCriticalCommands(target, chainName) : "";
320     StringAppendF(&cmd,
321         "*filter\n"
322         ":%s -\n"
323         "%s"
324         "-A %s%s\n"
325         "COMMIT\n", chainName, criticalCommands.c_str(), chainName, op);
326     return cmd;
327 }
328 
enableDataSaver(bool enable)329 int BandwidthController::enableDataSaver(bool enable) {
330     int ret = iptablesRestoreFunction(V4, makeDataSaverCommand(V4, enable), nullptr);
331     ret |= iptablesRestoreFunction(V6, makeDataSaverCommand(V6, enable), nullptr);
332     return ret;
333 }
334 
335 // TODO: Remove after removing these commands in CommandListener
addNaughtyApps(int numUids,const char * const appUids[])336 int BandwidthController::addNaughtyApps(int numUids, const char* const appUids[]) {
337     return manipulateSpecialApps(toStrVec(numUids, appUids), NAUGHTY_CHAIN,
338                                  IptJumpReject, IptOpInsert);
339 }
340 
341 // TODO: Remove after removing these commands in CommandListener
removeNaughtyApps(int numUids,const char * const appUids[])342 int BandwidthController::removeNaughtyApps(int numUids, const char* const appUids[]) {
343     return manipulateSpecialApps(toStrVec(numUids, appUids), NAUGHTY_CHAIN,
344                                  IptJumpReject, IptOpDelete);
345 }
346 
347 // TODO: Remove after removing these commands in CommandListener
addNiceApps(int numUids,const char * const appUids[])348 int BandwidthController::addNiceApps(int numUids, const char* const appUids[]) {
349     return manipulateSpecialApps(toStrVec(numUids, appUids), NICE_CHAIN,
350                                  IptJumpReturn, IptOpInsert);
351 }
352 
353 // TODO: Remove after removing these commands in CommandListener
removeNiceApps(int numUids,const char * const appUids[])354 int BandwidthController::removeNiceApps(int numUids, const char* const appUids[]) {
355     return manipulateSpecialApps(toStrVec(numUids, appUids), NICE_CHAIN,
356                                  IptJumpReturn, IptOpDelete);
357 }
358 
addNaughtyApps(const std::vector<std::string> & appStrUid)359 int BandwidthController::addNaughtyApps(const std::vector<std::string>& appStrUid) {
360     return manipulateSpecialApps(appStrUid, NAUGHTY_CHAIN, IptJumpReject, IptOpInsert);
361 }
362 
removeNaughtyApps(const std::vector<std::string> & appStrUid)363 int BandwidthController::removeNaughtyApps(const std::vector<std::string>& appStrUid) {
364     return manipulateSpecialApps(appStrUid, NAUGHTY_CHAIN, IptJumpReject, IptOpDelete);
365 }
366 
addNiceApps(const std::vector<std::string> & appStrUid)367 int BandwidthController::addNiceApps(const std::vector<std::string>& appStrUid) {
368     return manipulateSpecialApps(appStrUid, NICE_CHAIN, IptJumpReturn, IptOpInsert);
369 }
370 
removeNiceApps(const std::vector<std::string> & appStrUid)371 int BandwidthController::removeNiceApps(const std::vector<std::string>& appStrUid) {
372     return manipulateSpecialApps(appStrUid, NICE_CHAIN, IptJumpReturn, IptOpDelete);
373 }
374 
manipulateSpecialApps(const std::vector<std::string> & appStrUids,const std::string & chain,IptJumpOp jumpHandling,IptOp op)375 int BandwidthController::manipulateSpecialApps(const std::vector<std::string>& appStrUids,
376                                                const std::string& chain, IptJumpOp jumpHandling,
377                                                IptOp op) {
378     if (mBpfSupported) {
379         Status status = gCtls->trafficCtrl.updateUidOwnerMap(appStrUids, jumpHandling, op);
380         if (!isOk(status)) {
381             ALOGE("unable to update the Bandwidth Uid Map: %s", toString(status).c_str());
382       }
383       return status.code();
384     }
385     std::string cmd = "*filter\n";
386     for (const auto& appStrUid : appStrUids) {
387         StringAppendF(&cmd, "%s %s -m owner --uid-owner %s%s\n", opToString(op), chain.c_str(),
388                       appStrUid.c_str(), jumpToString(jumpHandling));
389     }
390     StringAppendF(&cmd, "COMMIT\n");
391     return iptablesRestoreFunction(V4V6, cmd, nullptr);
392 }
393 
setInterfaceSharedQuota(const std::string & iface,int64_t maxBytes)394 int BandwidthController::setInterfaceSharedQuota(const std::string& iface, int64_t maxBytes) {
395     int res = 0;
396     std::string quotaCmd;
397     constexpr char cost[] = "shared";
398     constexpr char chain[] = "bw_costly_shared";
399 
400     if (!maxBytes) {
401         /* Don't talk about -1, deprecate it. */
402         ALOGE("Invalid bytes value. 1..max_int64.");
403         return -1;
404     }
405     if (!isIfaceName(iface))
406         return -1;
407 
408     if (maxBytes == -1) {
409         return removeInterfaceSharedQuota(iface);
410     }
411 
412     auto it = mSharedQuotaIfaces.find(iface);
413 
414     if (it == mSharedQuotaIfaces.end()) {
415         const int ruleInsertPos = (mGlobalAlertBytes) ? 2 : 1;
416         std::vector<std::string> cmds = {
417             "*filter",
418             StringPrintf("-I bw_INPUT %d -i %s --jump %s", ruleInsertPos, iface.c_str(), chain),
419             StringPrintf("-I bw_OUTPUT %d -o %s --jump %s", ruleInsertPos, iface.c_str(), chain),
420             StringPrintf("-A bw_FORWARD -i %s --jump %s", iface.c_str(), chain),
421             StringPrintf("-A bw_FORWARD -o %s --jump %s", iface.c_str(), chain),
422         };
423         if (mSharedQuotaIfaces.empty()) {
424             cmds.push_back(StringPrintf("-I %s -m quota2 ! --quota %" PRId64
425                                         " --name %s --jump REJECT",
426                                         chain, maxBytes, cost));
427         }
428         cmds.push_back("COMMIT\n");
429 
430         res |= iptablesRestoreFunction(V4V6, Join(cmds, "\n"), nullptr);
431         if (res) {
432             ALOGE("Failed set quota rule");
433             removeInterfaceSharedQuota(iface);
434             return -1;
435         }
436         mSharedQuotaBytes = maxBytes;
437         mSharedQuotaIfaces.insert(iface);
438     }
439 
440     if (maxBytes != mSharedQuotaBytes) {
441         res |= updateQuota(cost, maxBytes);
442         if (res) {
443             ALOGE("Failed update quota for %s", cost);
444             removeInterfaceSharedQuota(iface);
445             return -1;
446         }
447         mSharedQuotaBytes = maxBytes;
448     }
449     return 0;
450 }
451 
452 /* It will also cleanup any shared alerts */
removeInterfaceSharedQuota(const std::string & iface)453 int BandwidthController::removeInterfaceSharedQuota(const std::string& iface) {
454     constexpr char cost[] = "shared";
455     constexpr char chain[] = "bw_costly_shared";
456 
457     if (!isIfaceName(iface))
458         return -1;
459 
460     auto it = mSharedQuotaIfaces.find(iface);
461 
462     if (it == mSharedQuotaIfaces.end()) {
463         ALOGE("No such iface %s to delete", iface.c_str());
464         return -1;
465     }
466 
467     std::vector<std::string> cmds = {
468         "*filter",
469         StringPrintf("-D bw_INPUT -i %s --jump %s", iface.c_str(), chain),
470         StringPrintf("-D bw_OUTPUT -o %s --jump %s", iface.c_str(), chain),
471         StringPrintf("-D bw_FORWARD -i %s --jump %s", iface.c_str(), chain),
472         StringPrintf("-D bw_FORWARD -o %s --jump %s", iface.c_str(), chain),
473     };
474     if (mSharedQuotaIfaces.size() == 1) {
475         cmds.push_back(StringPrintf("-D %s -m quota2 ! --quota %" PRIu64
476                                     " --name %s --jump REJECT",
477                                     chain, mSharedQuotaBytes, cost));
478     }
479     cmds.push_back("COMMIT\n");
480 
481     if (iptablesRestoreFunction(V4V6, Join(cmds, "\n"), nullptr) != 0) {
482         ALOGE("Failed to remove shared quota on %s", iface.c_str());
483         return -1;
484     }
485 
486     int res = 0;
487     mSharedQuotaIfaces.erase(it);
488     if (mSharedQuotaIfaces.empty()) {
489         mSharedQuotaBytes = 0;
490         if (mSharedAlertBytes) {
491             res = removeSharedAlert();
492             if (res == 0) {
493                 mSharedAlertBytes = 0;
494             }
495         }
496     }
497 
498     return res;
499 
500 }
501 
setInterfaceQuota(const std::string & iface,int64_t maxBytes)502 int BandwidthController::setInterfaceQuota(const std::string& iface, int64_t maxBytes) {
503     const std::string& cost = iface;
504 
505     if (!isIfaceName(iface)) return -EINVAL;
506 
507     if (!maxBytes) {
508         ALOGE("Invalid bytes value. 1..max_int64.");
509         return -ERANGE;
510     }
511     if (maxBytes == -1) {
512         return removeInterfaceQuota(iface);
513     }
514 
515     /* Insert ingress quota. */
516     auto it = mQuotaIfaces.find(iface);
517 
518     if (it != mQuotaIfaces.end()) {
519         if (int res = updateQuota(cost, maxBytes)) {
520             ALOGE("Failed update quota for %s", iface.c_str());
521             removeInterfaceQuota(iface);
522             return res;
523         }
524         it->second.quota = maxBytes;
525         return 0;
526     }
527 
528     const std::string chain = "bw_costly_" + iface;
529     const int ruleInsertPos = (mGlobalAlertBytes) ? 2 : 1;
530     std::vector<std::string> cmds = {
531         "*filter",
532         StringPrintf(":%s -", chain.c_str()),
533         StringPrintf("-A %s -j bw_penalty_box", chain.c_str()),
534         StringPrintf("-I bw_INPUT %d -i %s --jump %s", ruleInsertPos, iface.c_str(),
535                      chain.c_str()),
536         StringPrintf("-I bw_OUTPUT %d -o %s --jump %s", ruleInsertPos, iface.c_str(),
537                      chain.c_str()),
538         StringPrintf("-A bw_FORWARD -i %s --jump %s", iface.c_str(), chain.c_str()),
539         StringPrintf("-A bw_FORWARD -o %s --jump %s", iface.c_str(), chain.c_str()),
540         StringPrintf("-A %s -m quota2 ! --quota %" PRId64 " --name %s --jump REJECT",
541                      chain.c_str(), maxBytes, cost.c_str()),
542         "COMMIT\n",
543     };
544     if (iptablesRestoreFunction(V4V6, Join(cmds, "\n"), nullptr) != 0) {
545         ALOGE("Failed set quota rule");
546         removeInterfaceQuota(iface);
547         return -EREMOTEIO;
548     }
549 
550     mQuotaIfaces[iface] = QuotaInfo{maxBytes, 0};
551     return 0;
552 }
553 
getInterfaceSharedQuota(int64_t * bytes)554 int BandwidthController::getInterfaceSharedQuota(int64_t *bytes) {
555     return getInterfaceQuota("shared", bytes);
556 }
557 
getInterfaceQuota(const std::string & iface,int64_t * bytes)558 int BandwidthController::getInterfaceQuota(const std::string& iface, int64_t* bytes) {
559     const auto& sys = android::netdutils::sSyscalls.get();
560     const std::string fname = "/proc/net/xt_quota/" + iface;
561 
562     if (!isIfaceName(iface)) return -1;
563 
564     StatusOr<UniqueFile> file = sys.fopen(fname, "re");
565     if (!isOk(file)) {
566         ALOGE("Reading quota %s failed (%s)", iface.c_str(), toString(file).c_str());
567         return -1;
568     }
569     auto rv = sys.fscanf(file.value().get(), "%" SCNd64, bytes);
570     if (!isOk(rv)) {
571         ALOGE("Reading quota %s failed (%s)", iface.c_str(), toString(rv).c_str());
572         return -1;
573     }
574     ALOGV("Read quota res=%d bytes=%" PRId64, rv.value(), *bytes);
575     return rv.value() == 1 ? 0 : -1;
576 }
577 
removeInterfaceQuota(const std::string & iface)578 int BandwidthController::removeInterfaceQuota(const std::string& iface) {
579     if (!isIfaceName(iface)) return -EINVAL;
580 
581     auto it = mQuotaIfaces.find(iface);
582 
583     if (it == mQuotaIfaces.end()) {
584         ALOGE("No such iface %s to delete", iface.c_str());
585         return -ENODEV;
586     }
587 
588     const std::string chain = "bw_costly_" + iface;
589     std::vector<std::string> cmds = {
590         "*filter",
591         StringPrintf("-D bw_INPUT -i %s --jump %s", iface.c_str(), chain.c_str()),
592         StringPrintf("-D bw_OUTPUT -o %s --jump %s", iface.c_str(), chain.c_str()),
593         StringPrintf("-D bw_FORWARD -i %s --jump %s", iface.c_str(), chain.c_str()),
594         StringPrintf("-D bw_FORWARD -o %s --jump %s", iface.c_str(), chain.c_str()),
595         StringPrintf("-F %s", chain.c_str()),
596         StringPrintf("-X %s", chain.c_str()),
597         "COMMIT\n",
598     };
599 
600     const int res = iptablesRestoreFunction(V4V6, Join(cmds, "\n"), nullptr);
601 
602     if (res == 0) {
603         mQuotaIfaces.erase(it);
604     }
605 
606     return res ? -EREMOTEIO : 0;
607 }
608 
updateQuota(const std::string & quotaName,int64_t bytes)609 int BandwidthController::updateQuota(const std::string& quotaName, int64_t bytes) {
610     const auto& sys = android::netdutils::sSyscalls.get();
611     const std::string fname = "/proc/net/xt_quota/" + quotaName;
612 
613     if (!isIfaceName(quotaName)) {
614         ALOGE("updateQuota: Invalid quotaName \"%s\"", quotaName.c_str());
615         return -EINVAL;
616     }
617 
618     StatusOr<UniqueFile> file = sys.fopen(fname, "we");
619     if (!isOk(file)) {
620         int res = errno;
621         ALOGE("Updating quota %s failed (%s)", quotaName.c_str(), toString(file).c_str());
622         return -res;
623     }
624     // TODO: should we propagate this error?
625     sys.fprintf(file.value().get(), "%" PRId64 "\n", bytes).ignoreError();
626     return 0;
627 }
628 
runIptablesAlertCmd(IptOp op,const std::string & alertName,int64_t bytes)629 int BandwidthController::runIptablesAlertCmd(IptOp op, const std::string& alertName,
630                                              int64_t bytes) {
631     const char *opFlag = opToString(op);
632     std::string alertQuotaCmd = "*filter\n";
633 
634     // TODO: consider using an alternate template for the delete that does not include the --quota
635     // value. This code works because the --quota value is ignored by deletes
636 
637     /*
638      * Add alert rule in bw_global_alert chain, 3 chains might reference bw_global_alert.
639      * bw_INPUT, bw_OUTPUT (added by BandwidthController in enableBandwidthControl)
640      * bw_FORWARD (added by TetherController in setTetherGlobalAlertRule if nat enable/disable)
641      */
642     StringAppendF(&alertQuotaCmd, ALERT_IPT_TEMPLATE, opFlag, LOCAL_GLOBAL_ALERT, bytes,
643                   alertName.c_str());
644     StringAppendF(&alertQuotaCmd, "COMMIT\n");
645 
646     return iptablesRestoreFunction(V4V6, alertQuotaCmd, nullptr);
647 }
648 
setGlobalAlert(int64_t bytes)649 int BandwidthController::setGlobalAlert(int64_t bytes) {
650     const char *alertName = ALERT_GLOBAL_NAME;
651 
652     if (!bytes) {
653         ALOGE("Invalid bytes value. 1..max_int64.");
654         return -ERANGE;
655     }
656 
657     int res = 0;
658     if (mGlobalAlertBytes) {
659         res = updateQuota(alertName, bytes);
660     } else {
661         res = runIptablesAlertCmd(IptOpInsert, alertName, bytes);
662         if (res) {
663             res = -EREMOTEIO;
664         }
665     }
666     mGlobalAlertBytes = bytes;
667     return res;
668 }
669 
removeGlobalAlert()670 int BandwidthController::removeGlobalAlert() {
671 
672     const char *alertName = ALERT_GLOBAL_NAME;
673 
674     if (!mGlobalAlertBytes) {
675         ALOGE("No prior alert set");
676         return -1;
677     }
678 
679     int res = 0;
680     res = runIptablesAlertCmd(IptOpDelete, alertName, mGlobalAlertBytes);
681     mGlobalAlertBytes = 0;
682     return res;
683 }
684 
setSharedAlert(int64_t bytes)685 int BandwidthController::setSharedAlert(int64_t bytes) {
686     if (!mSharedQuotaBytes) {
687         ALOGE("Need to have a prior shared quota set to set an alert");
688         return -1;
689     }
690     if (!bytes) {
691         ALOGE("Invalid bytes value. 1..max_int64.");
692         return -1;
693     }
694     return setCostlyAlert("shared", bytes, &mSharedAlertBytes);
695 }
696 
removeSharedAlert()697 int BandwidthController::removeSharedAlert() {
698     return removeCostlyAlert("shared", &mSharedAlertBytes);
699 }
700 
setInterfaceAlert(const std::string & iface,int64_t bytes)701 int BandwidthController::setInterfaceAlert(const std::string& iface, int64_t bytes) {
702     if (!isIfaceName(iface)) {
703         ALOGE("setInterfaceAlert: Invalid iface \"%s\"", iface.c_str());
704         return -EINVAL;
705     }
706 
707     if (!bytes) {
708         ALOGE("Invalid bytes value. 1..max_int64.");
709         return -ERANGE;
710     }
711     auto it = mQuotaIfaces.find(iface);
712 
713     if (it == mQuotaIfaces.end()) {
714         ALOGE("Need to have a prior interface quota set to set an alert");
715         return -ENOENT;
716     }
717 
718     return setCostlyAlert(iface, bytes, &it->second.alert);
719 }
720 
removeInterfaceAlert(const std::string & iface)721 int BandwidthController::removeInterfaceAlert(const std::string& iface) {
722     if (!isIfaceName(iface)) {
723         ALOGE("removeInterfaceAlert: Invalid iface \"%s\"", iface.c_str());
724         return -EINVAL;
725     }
726 
727     auto it = mQuotaIfaces.find(iface);
728 
729     if (it == mQuotaIfaces.end()) {
730         ALOGE("No prior alert set for interface %s", iface.c_str());
731         return -ENOENT;
732     }
733 
734     return removeCostlyAlert(iface, &it->second.alert);
735 }
736 
setCostlyAlert(const std::string & costName,int64_t bytes,int64_t * alertBytes)737 int BandwidthController::setCostlyAlert(const std::string& costName, int64_t bytes,
738                                         int64_t* alertBytes) {
739     int res = 0;
740 
741     if (!isIfaceName(costName)) {
742         ALOGE("setCostlyAlert: Invalid costName \"%s\"", costName.c_str());
743         return -EINVAL;
744     }
745 
746     if (!bytes) {
747         ALOGE("Invalid bytes value. 1..max_int64.");
748         return -ERANGE;
749     }
750 
751     std::string alertName = costName + "Alert";
752     std::string chainName = "bw_costly_" + costName;
753     if (*alertBytes) {
754         res = updateQuota(alertName, *alertBytes);
755     } else {
756         std::vector<std::string> commands = {
757             "*filter\n",
758             StringPrintf(ALERT_IPT_TEMPLATE, "-A", chainName.c_str(), bytes, alertName.c_str()),
759             "COMMIT\n"
760         };
761         res = iptablesRestoreFunction(V4V6, Join(commands, ""), nullptr);
762         if (res) {
763             ALOGE("Failed to set costly alert for %s", costName.c_str());
764             res = -EREMOTEIO;
765         }
766     }
767     if (res == 0) {
768         *alertBytes = bytes;
769     }
770     return res;
771 }
772 
removeCostlyAlert(const std::string & costName,int64_t * alertBytes)773 int BandwidthController::removeCostlyAlert(const std::string& costName, int64_t* alertBytes) {
774     if (!isIfaceName(costName)) {
775         ALOGE("removeCostlyAlert: Invalid costName \"%s\"", costName.c_str());
776         return -EINVAL;
777     }
778 
779     if (!*alertBytes) {
780         ALOGE("No prior alert set for %s alert", costName.c_str());
781         return -ENOENT;
782     }
783 
784     std::string alertName = costName + "Alert";
785     std::string chainName = "bw_costly_" + costName;
786     std::vector<std::string> commands = {
787         "*filter\n",
788         StringPrintf(ALERT_IPT_TEMPLATE, "-D", chainName.c_str(), *alertBytes, alertName.c_str()),
789         "COMMIT\n"
790     };
791     if (iptablesRestoreFunction(V4V6, Join(commands, ""), nullptr) != 0) {
792         ALOGE("Failed to remove costly alert %s", costName.c_str());
793         return -EREMOTEIO;
794     }
795 
796     *alertBytes = 0;
797     return 0;
798 }
799 
flushExistingCostlyTables(bool doClean)800 void BandwidthController::flushExistingCostlyTables(bool doClean) {
801     std::string fullCmd = "*filter\n-S\nCOMMIT\n";
802     std::string ruleList;
803 
804     /* Only lookup ip4 table names as ip6 will have the same tables ... */
805     if (int ret = iptablesRestoreFunction(V4, fullCmd, &ruleList)) {
806         ALOGE("Failed to list existing costly tables ret=%d", ret);
807         return;
808     }
809     /* ... then flush/clean both ip4 and ip6 iptables. */
810     parseAndFlushCostlyTables(ruleList, doClean);
811 }
812 
parseAndFlushCostlyTables(const std::string & ruleList,bool doRemove)813 void BandwidthController::parseAndFlushCostlyTables(const std::string& ruleList, bool doRemove) {
814     std::stringstream stream(ruleList);
815     std::string rule;
816     std::vector<std::string> clearCommands = { "*filter" };
817     std::string chainName;
818 
819     // Find and flush all rules starting with "-N bw_costly_<iface>" except "-N bw_costly_shared".
820     while (std::getline(stream, rule, '\n')) {
821         if (rule.find(NEW_CHAIN_COMMAND) != 0) continue;
822         chainName = rule.substr(NEW_CHAIN_COMMAND.size());
823         ALOGV("parse chainName=<%s> orig line=<%s>", chainName.c_str(), rule.c_str());
824 
825         if (chainName.find("bw_costly_") != 0 || chainName == std::string("bw_costly_shared")) {
826             continue;
827         }
828 
829         clearCommands.push_back(StringPrintf(":%s -", chainName.c_str()));
830         if (doRemove) {
831             clearCommands.push_back(StringPrintf("-X %s", chainName.c_str()));
832         }
833     }
834 
835     if (clearCommands.size() == 1) {
836         // No rules found.
837         return;
838     }
839 
840     clearCommands.push_back("COMMIT\n");
841     iptablesRestoreFunction(V4V6, Join(clearCommands, '\n'), nullptr);
842 }
843 
opToString(IptOp op)844 inline const char *BandwidthController::opToString(IptOp op) {
845     switch (op) {
846     case IptOpInsert:
847         return "-I";
848     case IptOpDelete:
849         return "-D";
850     }
851 }
852 
jumpToString(IptJumpOp jumpHandling)853 inline const char *BandwidthController::jumpToString(IptJumpOp jumpHandling) {
854     /*
855      * Must be careful what one rejects with, as upper layer protocols will just
856      * keep on hammering the device until the number of retries are done.
857      * For port-unreachable (default), TCP should consider as an abort (RFC1122).
858      */
859     switch (jumpHandling) {
860     case IptJumpNoAdd:
861         return "";
862     case IptJumpReject:
863         return " --jump REJECT";
864     case IptJumpReturn:
865         return " --jump RETURN";
866     }
867 }
868